Jusop Choi
Jusop Choi
Verified email at skku.edu
Cited by
Cited by
Digital forensic analysis of encrypted database files in instant messaging applications on Windows operating systems: Case study with KakaoTalk, NateOn and QQ messenger
J Choi, J Yu, S Hyun, H Kim
Digital Investigation 28, 50-59, 2019
Forensic analysis of the backup database file in KakaoTalk messenger
J Choi, J Park, H Kim
2017 IEEE International Conference on Big Data and Smart Computing (BigComp …, 2017
Bypassing the integrity checking of rights objects in OMA DRM: A case study with the MelOn music service
J Choi, W Aiken, J Ryoo, H Kim
Proceedings of the 10th International Conference on Ubiquitous Information …, 2016
POSTER: I Can’t Hear This Because I Am Human: A Novel Design of Audio CAPTCHA System
J Choi, T Oh, W Aiken, SS Woo, H Kim
Asia Conference on Computer and Communications Security, 833-835, 2018
Threat modeling and analysis of voice assistant applications
G Cho, J Choi, H Kim, S Hyun, J Ryoo
International Workshop on Information Security Applications, 197-209, 2018
COAT: Code ObfuscAtion Tool to evaluate the performance of code plagiarism detection tools
S Ko, J Choi, H Kim
International Conference on Software security and Assurance (ICSSA), 2017
AMVG: Adaptive Malware Variant Generation Framework Using Machine Learning
J Choi, D Shin, H Kim, J Seotis, JB Hong
Pacific Rim international Symposium on Dependable Computing (PRDC), 2019
Towards Secure and Usable Certificate-Based Authentication System Using a Secondary Device for an Industrial Internet of Things
J Choi, J Cho, H Kim, S Hyun
Applied Sciences 10 (6), 2020
FUMVar: a practical framework for generating Fully-working and Unseen Malware Variants
B Jin, J Choi, H Kim, JB Hong
ACM Symposium on Applied Computing, 1656-1663, 2021
ACIDroid: A Practical App Cache Integrity Protection System on Android Runtime
J Choi, soolin Kim, J Cho, K Kim, S Hong, H Kim
ACM Symposium on Applied Computing, 376-383, 2020
The system can't perform the operation now. Try again later.
Articles 1–10